|
|
Configuring the FortiWiFi | Planning the FortiWiFi configuration |
Figure 5: Example NAT/Route multiple internet connection
DMZ network
Web Server
DMZ
Mail Server
Router
WAN1
Internet
WAN2
MODEM / DSL / Cable
Internal
Internal network
Transparent mode
In Transparent mode, the FortiWiFi unit is invisible to the network. Similar to a network bridge, all FortiWiFi interfaces must be on the same subnet. You only have to configure a management IP address so that you can make configuration changes. The management IP address is also used for antivirus and attack definition updates.
You typically use the FortiWiFi unit in Transparent mode on a private network behind an existing firewall or behind a router. The FortiWiFi unit performs firewall functions, IPSec VPN, virus scanning, IPS web content filtering, and Spam filtering.
You can connect up to four network segments to the FortiWiFi unit to control traffic between these network segments.
Table 8: Transparent mode network segments
FortiWiFi Unit | Internal Interface | External | Other |
|
| Interface |
|
|
|
|
|
Internal (1, 2, 3, 4) | WAN1 | WAN2 | |
|
|
| DMZ |
|
|
| WLAN |
Internal (1, 2, 3, 4) | WAN1 | WAN2 | |
|
|
| DMZ |
|
|
| WLAN |
Note: In Transparent mode, the modem interface is not available
31 | |